Product guide
Index
A
absolute scoring model, Policy Auditor 51
accept events, file integrity monitoring 62, 66
agent plug-in debug tool
display help 84
execute tool 83
run a benchmark 85
run a check 85
run an audit 84
save debug information 86
audience for Policy Auditor Product Guide 8
audit creation and editing
activate a benchmark for use in audit 42
assign benchmark profiles 41
filter benchmarks based on labels 41
selecting benchmarks 43
using audit builder 43
audits
add group 41
add system 41
add tag 41
benchmarks 39
blackout period 44
concept 11, 39
Data Collection Scan 36, 37
delete 44
differentiating expired results 40
disable 44
Foundstone, create audit that uses 42
frequency (how often data is gathered) 40
introduction 10
missing audit results 36, 37
no results 40
run manually 43
run on demand 42
set whiteout and blackout periods 44
specify criteria 41
Vulnerability Manager, create audit that uses 42
when audits are run 40
whiteout period 44
audits results
export 47
view 46
audits, scoring models on Policy Auditor
absolute scoring model 51
changing the scoring model 51
default scoring model 49
flat scoring model 50
flat unweighted scoring model 50
B
baseline, file integrity monitoring 60
benchmark profiles
effect on system audits 41
benchmarks
activate for use in Policy Auditor 42
defining frequency 43
select benchmarks for an audit 43
used in audits 39
using Foundstone to audit systems 43
using Vulnerability Manager to audit systems 43
C
CCE implementation 89
certificates for Vulnerability Manager ePO Extension 37, 38
checks
use in audits 39
Common Configuration Enumeration (CCE) 89
common criteria requirements 92
Common Platform Enumeration (CPE) 89
Common Vulnerabilities and Exposures (CVE) 88
Common Vulnerability Scoring System (CVSS) 90
compare file versions, file integrity monitoring 62, 65
compliance audits 10
components installed 12
conventions used in this guide 8
CPE implementation 89
CVE implementation 88
CVSS implementation 90
D
dashboards, Policy Auditor
default provided by Policy Auditor 77
PA:Compliance Summary dashboard 80
PA:MS Patch Status Summary dashboard 80
PA:Operations 80
PA:PCI Summary 81
queries as dashboard monitors 82
Data Collection Scan 28
Data Import server task 29
default scoring model, Policy Auditor 49
delete audits 44
differentiating expired results 40
disable audits 44
documentation
product-specific, finding 9
typographical conventions 8
E
ePolicy Orchestrator
features used by Policy Auditor 13
events, file integrity monitoring 62, 66
expiration date, Policy Auditor waivers 54
F
FDCC compliance 87
file integrity monitoring
accept events 62, 66
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.694